Search Results

Search found 18626 results on 746 pages for 'nicholas key'.

Page 494/746 | < Previous Page | 490 491 492 493 494 495 496 497 498 499 500 501  | Next Page >

  • Can't connect nonlocally after 12.10 upgrade

    - by user101815
    I've just upgraded one of my systems from 12.04 to 12.10. Now I can't connect on that system beyond my local network. Connections within the local network seem to work fine, and I can make nonlocal connections from other machines (like the one I'm asking this question from). I suspect that some routing information has been messed up, but I don't know where to look for it. It's not a nameserver problem -- pinging outside sites by their IP addresses doesn't work either. I have another laptop next to this one, also running Kubuntu 12.10. On the one that can't connect, arp produces no output. On the other one, it produces 192.168.0.1 ether 00:23:69:fa:ce:ae C wlan0 On the working machine, the output of netstat starts with some tcp entries. On the nonworking one, those entries are absent. I asked this question on the Ubuntu forum but haven't gotten any answers there. One further complication: since the troublesome machine has no outside connection, it's extremely difficult to download anything to it. For what it's worth, "ping 8.8.8.8" produces "connect: Network is unreachable". Update: after a lot of fiddling, I have my external world back. I don't know what the key action was, but the first indication of progress was that "ping 8.8.8.8" worked. At that point I still didn't have a working nameserver, so external URLs didn't work. But I did this (based on an online post, of course): sudo dpkg-reconfigure resolvconf and answered Yes to all prompts. That did the trick!! Apparently my problem was unique, or close to it, since I couldn't find any online references to it: local net working, remote net not working, including explicit IP addresses. So I suppose that if no one else has this problem, no one cares about the solution!!

    Read the article

  • Is there a proven concept to website reverse certificate authentication?

    - by Tom
    We're looking at exposing some of our internal application data externally via a website. The actual details of the website aren't that interesting, it'll be built using ASP.NET/IIS etc, that might be relevant. With this, I'm essentially I'm looking for a mechanism to authenticate users viewing my website. This sounds trivial, a username/password is typically fine, but I want more. Now I've read plenty about SSL/x.509 to realise that the CA determines that we're alright, and that the user can trust us. But I want to trust the user, I want the user to be rejected if they don't have the correct credentials. I've seen a system for online banking whereby the bank issues a certificate which gets installed on the users' computer (it was actually smartcard based). If the website can't discover/utilise the key-pair then you are immediately rejected! This is brutal, but necessary. Is there a mechanism where I can do the following: Generate a certificate for a user Issue the certificate for them to install, it can be installed on 1 machine If their certificate is not accessible, they are denied all access A standard username/password scheme is then used after that SSL employed using their certificate once they're "in" This really must already exist, please point me in the right direction! Thanks for your help :)

    Read the article

  • Win8 x64 Laptop (Samsung) unable to boot after installing Ubuntu

    - by user285872
    I posted here a while back and no one was able to help me so I am going to try to explain my problem better. I have a Samsung series 7 Ultrabook and I connected a USB optical drive with an Ubuntu 14.04 installation disc. I did not set or change any of my partitions, however, as I mainly wanted to just be able to boot from the disc and fool around with Ubuntu. Upon restarting my computer I get a blue-screen message saying: Recovery Your PC needs to be repiared The Boot configuration date file is missing some required information. File: \BCD Error Code: 0xc000000d You'll need to use the recovery tools on your installing media. If you don't have any installation media (like a disc or USB device), contact your system administrator or PC manufacturer. However I am never given the option to even try to boot to anything. When I turn my computer on the optical drive spins and then after a moment or two comes to a halt. I turned off safeboot and switched it to CSM (I believe that is what it is called) mode, and that makes it so when I turn my computer on it takes me to a Windows Recovery screen. I am able to change the date I want to recover and view all the applications installed, however upon recovering Windows says "All boot options are tried. Press key to recover with factory image using Recovery or any other keys for next boot loop iteration." It seems to be stuck in a loop. Can someone please help me?! I'm so confused and nothing is working!

    Read the article

  • Project Showcase: SaaS Web Apps Hits a Home Run with New SCMS Database

    - by Webgui
    We love seeing projects from start to finish, and we’re happy to share the latest example with you. Who: SaaS Web Apps – they use Software as a Service to create web applications that look and feel like desktop applications. What: SaaS Web Apps needed to build a Sports Contract Management System (SCMS) for one of its customers, Premier Stinson Sports. Why: The SCMS database is used for collecting, analyzing and recording college coach and athletic directors’ employment and contract data. The Challenge: Premier Stinson Sports works with a number of partners, each with its own needs and unique requirements. For example, USA Today uses the system to provide cutting edge news analysis while The National Sports Law Institute of Marquette University Law School uses it to for the latest sports contract data and student analysis. In addition, the system needed to be secure due to the sensitivity of the data; it was essential that the user security and permissions be easily configurable. As always, performance was a key factor, especially with the intense reporting and analytical capabilities for this project. Because of this, most of the processing had to be done on a dedicated server but the project called for the richness and responsiveness of a desktop application. The Solution: To execute the project, SaaS Web Apps used APS.Net-based Visual WebGui from Gizmox, combined with SQL Server 2008 and SQL Reporting Services. This combination resulted in a quick deployment for SaaS Web Apps’ customers. The Result: The completed project gave each partner the scalability and availability of a web application with the performance and security of a desktop application. As an example, USA Today pulls data from this database to give readers the latest sports stats – Salary analysis of 2010 Football Bowl Subdivision Coaches. And here’s a screenshot of the database itself. Great work, SaaS Web Apps!

    Read the article

  • VMware player suspends on screensaver

    - by Chad
    I have this problem with my VMWare player. When my host operating system either goes into screen saver or I lock the work station with Windows Key + L. VMWare player pauses or halts everything. So when i come back to the computer and there is a background task working inside the virtual machine it does not progress until i've actualy loged back on. Is there any way to stop this behaviour with VMWare player and keep it running in the background even when the screen saver or the work station is locked? Version of VMWare is: 3.0.0 build-203739

    Read the article

  • strategy /insights for avoiding document content loss due to encryption

    - by pbernatchez
    I'm about to encourage a group of people to begin using S-Mime and GPG for digital signatures and encryption. I foresee a nightmare of encrypted documents which can no longer be recovered because of lost keys. The thorniest issue is archiving. The natural way to preserve privacy in an archive is to archive the encrypted document. But that opens us up to the risk of a lost key when time comes to unarchive a document, or a forgotten password. After all it will be a long way in the future. This would be equivalent to having destroyed the document. First thought is archiving keys with documents, but that still leaves the forgotten pass phrase. Archiving the passphrase too would be tantamount to archiving in the clear. No privacy. What approaches do you use? What insights can you offer on the issue?

    Read the article

  • Keyboard and mouse/touchpad wont work in 11.10

    - by Maynard
    I installed Ubuntu 11.10 onto my Fujitsu Lifebook N5010 Laptop yesterday and all seemed good up until this morning. My key board and mouse/touchpad no longer work. I can, however, plug in a usb mouse and that works so I am able to shut the laptop off. With the usb mouse plugged in I still can't use the keyboard so the only thing the mouse is good for is shutting the system down. When I first boot the system the mouse/touchpad and keyboard will work long enough so that I can log in my password but then after about 20 seconds or so the mouse/touchpad and keyboard stop working. I have searched the internet for answers and haven't found anything that is working for me. Someone suggested I type a particular command into the terminal but not real sure how I do that without a keyboard. And going out to buy a usb keyboard (assuming that would work) and usb mouse still doesn't fix the problem. Anybody have any suggestions I would REALLY appreciate it. I love Ubuntu but this is just not good.

    Read the article

  • Pass User Data to AWS client

    - by bearrito
    Has anyone successful passed user data to the AWS CLI ? I have tried various incantations of the following but it does not work. Docs say string must be base64 encoded : http://docs.aws.amazon.com/cli/latest/reference/ec2/run-instances.html The instance logs never indicate the script is executed and chef is installed. aws ec2 run-instances --image-id ami-a73264ce --count 1 --instance-type t1.micro --key-name scrubbed --iam-instance-profile Arn=arn:aws:iam::scrubbed:instance-profile/scrubbed --user-data $(base64 chef_user_data.sh --wrap=0) chef_user_data.sh #!/bin/bash curl -L https://www.opscode.com/chef/install.sh | sudo bash

    Read the article

  • WebLogic Partner Community Newsletter March 2012

    - by JuergenKress
    Dear WebLogic partner community member, With the launch of WebLogic 12c and Fusion Middleware, PS5 training has become an important key. Thus we are offering a WLS 12c hands-on bootcamp road-show together with the PTS team and help you to get trained! We will add and confirm more dates in next few weeks. Please let us know if you would like to suggest some more locations. We recommend all bootcamp attendees to become a certified Application Grid Certified Implementation Specialist (free of charge) and in addition to this we are also offering Advanced ADF ecourse. See you at one of the training! Jürgen Kress Oracle WebLogic Partner Adoption EMEA To read the newsletter please visit http://tinyurl.com/weblogicnewsMarch2012   ( OPN Account required) To become a member of the WebLogic Partner Community please register at http://www.oracle.com/partners/goto/wls-emea ( OPN account required). If you need support with your account please contact the Oracle Partner Business Center. Blog Twitter LinkedIn Mix Forum Wiki Technorati Tags: WebLogic,Oracle,OPN,WebLogic Community,WebLogic Community Newsletter,Jürgen Kress,WebLogic 12c,WebLogic knowledge zone,WebLogic Specilization,WebLogic boothcamp,WebLogic training,WebLogic education

    Read the article

  • Please recommend the best tools to build a test plan management tool

    - by fzkl
    I have mostly worked on hardware testing in my professional career and would like to get onto the software development side. I thought working on a practically usable project will help motivate me and help acquire some skills. I have decided to build a test plan management tool for the QA team I work in (We use excel sheets!). The test plan management tool should be browser based and should support this: There would be many test plans, each test plan having test sets, test sets having test cases and test cases having instructions, attachments and Pass/fail status marking and bug info in case of failure. It should also have an export to excel option. I have a visual picture of the tool I am looking to build but I don't have enough experience to figure our where to start. My current programming skills are limited to C and shell programming and I want to pick up python. What tools (programming language, database and anything else?) would you recommend for me to get this done? Also what are the key concepts in the recommended programming language that I should focus on to build a browser based tool like this?

    Read the article

  • How do I trap the mouse pointer within a VirtualBox Guest OS?

    - by Samuel
    I'm on a Mac Mini 2011 with VirtualBox installed. I have Windows 7 running as a Guest OS. My question: How do I "trap" my mouse pointer within Windows? In other words, I don't want my mouse to move outside to the Host OS. Ideally, I would be able to press the Host key to "untrap" my mouse. The purpose: I'm playing Warcraft 3 in the Guest OS and I can't scroll the screen since the mouse keeps jumping to the Host OS instead of scrolling the screen. This happens even in full-screen mode.

    Read the article

  • REST API wrapper - class design for 'lite' object responses

    - by sasfrog
    I am writing a class library to serve as a managed .NET wrapper over a REST API. I'm very new to OOP, and this task is an ideal opportunity for me to learn some OOP concepts in a real-life situation that makes sense to me. Some of the key resources/objects that the API returns are returned with different levels of detail depending on whether the request is for a single instance, a list, or part of a "search all resources" response. This is obviously a good design for the REST API itself, so that full objects aren't returned (thus increasing the size of the response and therefore the time taken to respond) unless they're needed. So, to be clear: .../car/1234.json returns the full Car object for 1234, all its properties like colour, make, model, year, engine_size, etc. Let's call this full. .../cars.json returns a list of Car objects, but only with a subset of the properties returned by .../car/1234.json. Let's call this lite. ...search.json returns, among other things, a list of car objects, but with minimal properties (only ID, make and model). Let's call this lite-lite. I want to know what the pros and cons of each of the following possible designs are, and whether there is a better design that I haven't covered: Create a Car class that models the lite-lite properties, and then have each of the more detailed responses inherit and extend this class. Create separate CarFull, CarLite and CarLiteLite classes corresponding to each of the responses. Create a single Car class that contains (nullable?) properties for the full response, and create constructors for each of the responses which populate it to the extent possible (and maybe include a property that returns the response type from which the instance was created). I expect among other things there will be use cases for consumers of the wrapper where they will want to iterate through lists of Cars, regardless of which response type they were created from, such that the three response types can contribute to the same list. Happy to be pointed to good resources on this sort of thing, and/or even told the name of the concept I'm describing so I can better target my research.

    Read the article

  • Duplicate of IPSEC certificate template not displaying

    - by Tim Brigham
    I am working on getting IPSEC working on computers outside my domain. I am unable to get a duplicate of the IPSec Offline Request template to show on the web interface. My CA is 2008 R2 Enterprise and the permissions on the template should be adequate to allow me access (my account has read and enroll). If I publish the original template it functions as desired. I also have other custom templates in use (although using autoenrollment). The duplicate is almost identical to the original, excepting that it has a longer validity period and the private key is marked as exportable. How do I debug at this point?

    Read the article

  • How to disable the Windows 8 lock screen, without disabling the password?

    - by zeel
    Windows 8 now has a slide-away lock screen like so many other OSes designed for a touch interface. However on a non-touch PC/laptop this is just an extra annoying step in logging in. There is an option to disable it, but this also turns off the password requirement. Is there a way to disable the lock screen, and have Windows wake up directly to the password entry screen? Often when pressing a key to hide it there will be a noticeable delay before password entry is accepted, and no indicator, so one can easily lose the first character or so that they attempt to type, thus failing the login attempt.

    Read the article

  • Non interactive git clone (ssh fingerprint prompt)

    - by qwe
    I want to clone a repo in a non-interactive way. When cloning, git asks to confirm host's fingerprint: The authenticity of host 'bitbucket.org (207.223.240.182)' can't be established. RSA key fingerprint is 97:8c:1b:f2:6f:14:6b:5c:3b:ec:aa:46:46:74:7c:40. Are you sure you want to continue connecting (yes/no)? no How do I force "yes" every time this questions pops up? I tried using yes yes | git clone ..., but it doesn't work. EDIT: Here's a solution: Can I automatically add a new host to known_hosts? (adds entires to known_hosts with ssh-keyscan).

    Read the article

  • Hide a 2nd Monitor from a Programs Print Screen

    - by jasondavis
    I run 2 monitors on a PC that also runs a program for the Freelancing site Elance.com. The program they provide, takes screenshots and uploads them to my account for a client to see at different intervals. My goal is to make the screenshot that the program takes and uploads, to somehow only take a shot of my "Main" or "Defualt" monitor and ignore my 2nd monitor. The main reason is my 2nd monitor generally has private data that I do not displayed to the world on a website. Does anyone know if there is any kind of program or trick I can use that will make it appear that I have 1 monitor when a Screenshot is taken? I am not sure how the program does it and how that works as I am a web developer and not a C++ or any kind of low level programmer. If the Elance program simply runs the same function that is called when a PrintScreen key is pressed on a keyboard, then I am thinking it might be possible to maybe trick that into only the default desktop? Any ideas or help would be appreciated, thank you

    Read the article

  • Can someone help me?

    - by user38124
    Sorry, but I want to say something here, my friend have a new software called "Edited out see revisions 8.0", it can help people to reset any windows password. As I am kind for this website, so I want to know where can help me to submit it? Can you give me some advice? Here is a lilltle message about key 8.0: blablabla spam marketing can I submit the software link here ? for this, friends who view my post can go and help me for some advices to improve it? Thank you very much!

    Read the article

  • How to use cursor keys to switch buffers in GNU screen

    - by suvayu
    I want to use cursor keys or cursor keys with a modifier like Ctrl to switch between screen buffers (e.g. C-a [arrow] or C-a C-[arrow]). So far I have tried settings like the ones below with no success. bind \224\115 prev bind \224\116 next bindkey -d ^[[1;5D prev bindkey -d ^[[1;5C next They are either ignored or behave unexpectedly (the second one). I am also not sure how to specify the keys. To get the characters, I either used C-v to quote them in bash, or tried to look-up on the Internet (e.g. http://ascii-table.com/ansi-escape-sequences.php). Any idea how I can achieve this key binding?

    Read the article

  • Black screen after scheduled resume from sleep

    - by macbirdie
    I have a problem with my two Windows 7 setups at home. Whenever a scheduled task wakes up the machines from sleep, a black screen with a mouse cursor appears. If I move the mouse or press any key, desktop appears. The biggest problem is that during that black screen phase the display, sometimes even the PC too, doesn't go to stand by after a set period of time in power settings. If I get the desktop to show up, standby functions work fine. Display goes blank after a few minutes and as soon as the task doesn't need the PC, it goes back to sleep. It's frustrating that this "feature" is wasting energy and keeps lighting up the pc in the middle of the night for me to find it that way after I wake up. I found a handful of threads on the intertubes about the issue, but there were no answers in any of them. It sometimes happens in my XP machine at work as well.

    Read the article

  • Gesture Based NetBeans Tip Infrastructure

    - by Geertjan
    All/most/many gestures you make in NetBeans IDE are recorded in an XML file in your user directory, "var/log/uigestures", which is what makes the Key Promoter I outlined yesterday possible. The idea behind it is for analysis to be made possible, when you periodically pass the gestures data back to the NetBeans team. See http://statistics.netbeans.org for details. Since the gestures in the 'uigestures' file are identifiable by distinct loggers and other parameters, there's no end to the interesting things that one is able to do with it. While the NetBeans team can see which gestures are done most frequently, e.g., which kinds of projects are created most often, thus helping in prioritizing new features and bugs, etc, you as the user can, depending on who and how the initiative is taken, directly benefit from your collected data, too. Tim Boudreau, in a recent article, mentioned the usefulness of hippie completion. So, imagine that whenever you use code completion, a tip were to appear reminding you about hippie completion. And then you'd be able to choose whether you'd like to see the tip again or not, etc, i.e., customize the frequency of tips and the types of tips you'd like to be shown. And then, it could be taken a step further. The tip plugin could be set up in such a way that anyone would be able to register new tips per gesture. For example, maybe you have something very interesting to share about code completion in NetBeans. So, you'd create your own plugin in which there'd be an HTML file containing the text you'd like to have displayed whenever you (or your team members, or your students, maybe?) use code completion. Then you'd register that HTML file in plugin's layer file, in a subfolder dedicated to the specific gesture that you're interested in commenting on. The same is true, not just for NetBeans IDE, but for anyone creating their applications on top of the NetBeans Platform, of course.

    Read the article

  • How can I enable encryption for SQLite3 in PHP5.3?

    - by meouw
    The php manual for SQLite3::open has this information: public bool SQLite3::open ( string $filename [, int $flags = SQLITE3_OPEN_READWRITE | SQLITE3_OPEN_CREATE [, string $encryption_key ]] ) Opens an SQLite 3 Database. If the build includes encryption, then it will attempt to use the key. I would like to use encrypted SQLite databases for a project I'm working on, but I can't find any information anywhere on how to build the SQLite module including encryption. Does anyone know how to do this? Perhaps it's so obvious no one has published any information or perhaps only commercial modules are available. I've noticed that the developers of SQLite offer a proprietary encryption extension. Is this the only way to go?

    Read the article

  • Skype prevents computer from idling?

    - by Corey Sarnia
    When using Skype, it prevents the computer from idling, going into sleep mode and turning the monitor off. I notice on my laptop if I use a tool like Monitor Off to manually turn my monitor off, after about a minute, the monitor will come back on as if Skype has pressed a key or moved my mouse to exit out of that idle state. This also prevents other programs (such as Pidgin) from going idle as well, so it looks like I'm online 24/7... even though it should be going idle after 5 minutes of inactivity. Is there a way to circumvent this behavior in Skype?

    Read the article

  • High-level strategy for distinguishing a regular string from invalid JSON (ie. JSON-like string detection)

    - by Jonline
    Disclaimer On Absence of Code: I have no code to post because I haven't started writing; was looking for more theoretical guidance as I doubt I'll have trouble coding it but am pretty befuddled on what approach(es) would yield best results. I'm not seeking any code, either, though; just direction. Dilemma I'm toying with adding a "magic method"-style feature to a UI I'm building for a client, and it would require intelligently detecting whether or not a string was meant to be JSON as against a simple string. I had considered these general ideas: Look for a sort of arbitrarily-determined acceptable ratio of the frequency of JSON-like syntax (ie. regex to find strings separated by colons; look for colons between curly-braces, etc.) to the number of quote-encapsulated strings + nulls, bools and ints/floats. But the smaller the data set, the more fickle this would get look for key identifiers like opening and closing curly braces... not sure if there even are more easy identifiers, and this doesn't appeal anyway because it's so prescriptive about the kinds of mistakes it could find try incrementally parsing chunks, as those between curly braces, and seeing what proportion of these fractional statements turn out to be valid JSON; this seems like it would suffer less than (1) from smaller datasets, but would probably be much more processing-intensive, and very susceptible to a missing or inverted brace Just curious if the computational folks or algorithm pros out there had any approaches in mind that my semantics-oriented brain might have missed. PS: It occurs to me that natural language processing, about which I am totally ignorant, might be a cool approach; but, if NLP is a good strategy here, it sort of doesn't matter because I have zero experience with it and don't have time to learn & then implement/ this feature isn't worth it to the client.

    Read the article

  • How to failover to local account on a cisco switch/router if radius server fails?

    - by 3d1l
    I have the following configuration on a switch that I testing for RADIUS authentication: aaa new-model aaa authenticaton login default group radius local aaa authentication enable default group radius enable aaa authorization exec default group radius local enable secret 5 XXXXXXXXX ! username admin secret 5 XXXXXXXXX ! ip radius source-interface FastEthernet0/1 radius-server host XXX.XXX.XXX.XXX auth-port 1812 acct-port 1813 key XXXXXXXXX radius-server retransmit 3 ! line con 0 line vty 5 15 Radius authentication is working just fine but if the server is not available I can not log into the router with the ADMIN account. What's wrong there? Thanks!

    Read the article

  • Altering specific configuration values in the On-Screen Keyboard of Windows 7

    - by fnst
    I have to use the On-Screen Keyboard of Windows 7 for typing: (In case you haven't used it yet, you can get it via: All Programs - Accessories - Ease of Access - On-Screen Keyboard or simply search for "osk.exe") It offers a feature to "hover" about the buttons. Microsoft describes it as the following: In hovering mode, you use a mouse or joystick to point to a key for a predefined period of time, and the selected character is typed automatically. There is my specific problem. The predefined period of time is too long to be useful for me. The minimum amount of time is 0.5 seconds (max. 3 seconds). Is there any way to alter this value to something < 0.5? For example via editing the registry? Edit: The entry *'HKEY_CURRENT_USER\Software\Microsoft\Osk\HoverPeriod'* cannot be set lower than 500 ms. Any helpful tip would be great!

    Read the article

< Previous Page | 490 491 492 493 494 495 496 497 498 499 500 501  | Next Page >